A systematic review of security requirements engineering

D Mellado, C Blanco, LE Sánchez… - Computer Standards & …, 2010 - Elsevier
One of the most important aspects in the achievement of secure software systems in the
software development process is what is known as Security Requirements Engineering …

Exploring software security approaches in software development lifecycle: A systematic mapping study

NM Mohammed, M Niazi, M Alshayeb… - Computer Standards & …, 2017 - Elsevier
There is an increase use of security driven approaches to support software development
activities, such as requirements, design and implementation. The objective of this paper is to …

Methodological framework for analysis and synthesis of a set of secure software development controls

AV Barabanov, AS Markov, VL Tsirlov - Journal of Theoretical and …, 2016 - elibrary.ru
This article discusses the issues of standardizing commercial production of secure software
products. It studies administrative and technical controls for minimizing the number of …

Implementing information security best practices on software lifecycle processes: The ISO/IEC 15504 Security Extension

AL Mesquida, A Mas - Computers & Security, 2015 - Elsevier
The ISO/IEC 15504 international standard can be aligned with the ISO/IEC 27000
information security management framework. During the research conducted all the existing …

Vulnerably (mis) configured? Exploring 10 years of developers' Q&As on Stack Overflow

R May, C Biermann, XM Zerweck, K Ludwig… - Proceedings of the 18th …, 2024 - dl.acm.org
The increasing number of attacks exploiting system vulnerabilities in recent years underpins
the growing importance of security; especially for software comprising configuration options …

Security requirements engineering framework for software product lines

D Mellado, E Fernández-Medina, M Piattini - Information and Software …, 2010 - Elsevier
CONTEXT: The correct analysis and understanding of security requirements are important
because they assist in the discovery of any security or requirement defects or mistakes …

ASE: A comprehensive pattern-driven security methodology for distributed systems

AV Uzunov, EB Fernandez, K Falkner - Computer Standards & Interfaces, 2015 - Elsevier
Incorporating security features is one of the most important and challenging tasks in
designing distributed systems. Over the last decade, researchers and practitioners have …

A product-line-engineering framework for secure enterprise-resource-planning systems

R May, C Biermann, A Kenner, J Krüger… - Procedia Computer …, 2024 - Elsevier
Abstract Enterprise-resource-planning (ERP) systems are highly complex, incorporating
critical data and configuration options that can easily cause security threats or risks. While …

[PDF][PDF] Privacy threats in software architectures

K Wuyts - PhD (Jan. 2015), 2015 - lirias.kuleuven.be
With privacy becoming a key concern in modern society, it is important that privacy
measures are strongly incorporated whenever digital data are involved. Unfortunately …

Synthesis of secure software development controls

A Barabanov, A Markov, A Fadin, V Tsirlov… - Proceedings of the 8th …, 2015 - dl.acm.org
A study of the available approaches aimed at mitigating vulnerabilities in the software
development, and their applicability during the software compliance evaluation was carried …